搜索结果: 1-6 共查到“masking scheme”相关记录6条 . 查询时间(0.062 秒)
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Authenticated Cipher COLM CPA
2019/8/22
Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical impl...
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection
Side-channel Analysis Inner Product Masking Fault Detection
2019/8/14
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus there is an insistent demand for dual side-chann...
A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'
higher-order masking probing security
2017/11/1
Zhang, Qiu and Zhou propose two optimised masked algorithms for computing functions of the form x↦x⋅ℓ(x)x↦x⋅ℓ(x) for any linear function ℓℓ. They claim ...
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
Side-channel attack ISW countermeasure Rivain-Prouff countermeasure
2016/6/2
A common countermeasure against side-channel attacks consists in using the masking
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further generalized
by Rivain and...
On the Practical Security of a Leakage Resilient Masking Scheme
Practical Security Masking Scheme
2014/3/12
At TCC 2012, Dziembowski and Faust show how to construct leakage resilient circuits using secret sharing based on the inner product [2]. At Asiacrypt 2012, Ballash et al. turned the latter constructio...
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
masking complexity addition chain
2014/3/12
Masking is a well-known technique used to prevent block cipher implementations from side-channel attacks. Higher-order side channel attacks (e.g. higher-order DPA attack) on widely used block cipher l...